Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2007
DOI: 10.1016/j.comnet.2006.09.016
|View full text |Cite
|
Sign up to set email alerts
|

Learning DFA representations of HTTP for protecting web applications

Abstract: Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using intrusion detection is challenging, especially when autonomy is required (i.e., without signature updates or extensive administrative overhead). Web applications are difficult to protect because they are large, complex, highly customized, and often created by programmers with little security background. Anomaly-based intrusion detection… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0
4

Year Published

2008
2008
2021
2021

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 73 publications
(45 citation statements)
references
References 36 publications
(54 reference statements)
0
41
0
4
Order By: Relevance
“…For some of the six algorithms, we also consider them in isolation. We also implemented the character distribution metric described by Wang and Stolfo [23], and the DFA induction and n-grams described by Ingham et al and Ingham [33,32].…”
Section: Algorithmsmentioning
confidence: 99%
See 3 more Smart Citations
“…For some of the six algorithms, we also consider them in isolation. We also implemented the character distribution metric described by Wang and Stolfo [23], and the DFA induction and n-grams described by Ingham et al and Ingham [33,32].…”
Section: Algorithmsmentioning
confidence: 99%
“…The algorithm does not require negative examples. This algorithm is described in detail by Ingham et al [33].…”
Section: Algorithmsmentioning
confidence: 99%
See 2 more Smart Citations
“…Ingham et al [22] use a deterministic finite automaton (DFA) to build a profile of legal HTTP requests. It works by tokenizing HTTP request parameters, and storing each token type and (optionally) its value.…”
Section: Related Workmentioning
confidence: 99%